Sciweavers

7544 search results - page 1346 / 1509
» Network Forensics Analysis
Sort
View
ISCC
2006
IEEE
104views Communications» more  ISCC 2006»
15 years 10 months ago
Stable High-Capacity One-Hop Distributed Hash Tables
Most research on Distributed Hash Tables (DHTs) assumes ephemeral, lightly loaded deployments. Each node has a lifetime of a few hours and initiates a lookup once every few second...
John Risson, Aaron Harwood, Tim Moors
ISM
2006
IEEE
112views Multimedia» more  ISM 2006»
15 years 10 months ago
Security Considerations for SOA-Based Multimedia Applications
Growing levels of digitalization and broadband access drives extremely fast progress in multimedia and networking technologies and allows consumers to create requirements at an ac...
Andrew Roczniak, Alexandre Miège, Abdulmota...
DAC
2006
ACM
15 years 10 months ago
Visibility enhancement for silicon debug
Several emerging Design-for-Debug (DFD) methodologies are addressing silicon debug by making internal signal values and other data observable. Most of these methodologies require ...
Yu-Chin Hsu, Fur-Shing Tsai, Wells Jong, Ying-Tsai...
133
Voted
DOCENG
2006
ACM
15 years 10 months ago
Benefits of structured multimedia documents in IDTV: the end-user enrichment system
This paper presents a system that exploits the benefits of modelling multimedia presentations as structured documents within the context of interactive digital television systems....
Pablo César, Dick C. A. Bulterman, A. J. Ja...
ISLPED
2006
ACM
103views Hardware» more  ISLPED 2006»
15 years 10 months ago
Low power light-weight embedded systems
Light-weight embedded systems are now gaining more popularity due to the recent technological advances in fabrication that have resulted in more powerful tiny processors with grea...
Majid Sarrafzadeh, Foad Dabiri, Roozbeh Jafari, Ta...
« Prev « First page 1346 / 1509 Last » Next »